An Introduction to Internet Governance 7th edition

Page 121

35 Schneier B (2013) NSA surveillance: A guide to staying secure. The Guardian, 6 September. Available at https://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-sur‑ veillance [accessed 22 October 2016]. 36 For a listing of anti‑cybercrime networks, organisations and initiatives worldwide, refer to the CoE’s resources page. Available at http://www.coe.int/t/dghl/cooperation/economiccrime/cy‑ bercrime/Documents/networks/Networks_en.asp [accessed 22 October 2016]. 37 The Commonwealth (no date) Commonwealth Cybercrime Initiative. Available at http:// thecommonwealth.org/commonwealth-cybercrime-initiative [accessed 22 October 2016]. 38 Bailey C (2002) The International Convention on Cybercrime. Association for Progressive Communications. Available at http://rights.apc.org/privacy/treaties_icc_bailey.shtml [accessed 7 March 2016]. 39 Council of Europe (2014) Recommendation CM/Rec (2014)6 of the Committee of Ministers to member states on a Guide to human rights for Internet users. Available at https://rm.coe.int/ CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=09000016804d 5b31 [accessed 20 October 2016]. 40 European Union (2006) Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provi‑ sion of publicly available electronic communications services or of public communications net‑ works and amending Directive 2002/58/EC. Available at http://eur-lex.europa.eu/LexUriServ/ LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF [accessed 22 October 2016]. 41 For a detailed overview of the data retention issues in EU, refer to European Commission (2011) Evaluation report on the Data Retention Directive (Directive 2006/24/EC). Available at http:// eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2011:0225:FIN:en:PDF [accessed 22 October 2016]. 42 CJEU (2014) Judgement of the Court in Joined Cases C‑293/12 and C‑594/12: Digital Rights Ireland v Minister for Communications, Marine and Natural Resources and Others. Available at http://curia.europa.eu/juris/document/document.jsf?text=&docid=150642&pageIndex=0&d oclang=EN&mode=lst&dir=&occ=first&part=1&cid=106306 [accessed 22 October 2016]. 43 European Commission (2004) Critical Infrastructure Protection in the Fight Against Terrorism. Communication from the Commission to the Council and the European Parliament. Available at http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:52004DC0702 [accessed 22 Octo‑ ber 2016]. 44 Essers L (2014) Cyberattack on German steel factory causes ‘massive damage’. IT World, 19 De‑ cember. Available at http://www.itworld.com/article/2861675/cyberattack‑on‑german‑steel‑fac‑ tory‑causes‑massive‑damage.html [accessed 22 October 2016]. 45 IETF (2007) Internet Security Glossary, Version 2. Available at https://tools.ietf.org/html/ rfc4949 [accessed 18 August 2016]. 46 USA White House (2013) Presidential Policy Directive – Critical Infrastructure Security and Resilience. Available at https://www.whitehouse.gov/the-press-office/2013/02/12/presidentialpolicy-directive-critical-infrastructure-security-and-resil [accessed 18 August 2016]. 47 European Commission (2006) European Programme for Critical Infrastructure Protection. Avail‑ able at http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=URISERV%3Al33260 [accessed 18 Au‑ gust 2016]. 48 European Union (2008) Council Directive 2008/114/EC of 8 December 2008 on the identifica‑ tion and designation of European critical infrastructures and the assessment of the need to improve their protection. Available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri= OJ:L:2008:345:0075:0082:EN:PDF [accessed 18 August 2016]. 49 OECD (2008) Recommendation of the Council on the Protection of Critical Information Infra‑ structures. Available at http://webnet.oecd.org/OECDACTS/Instruments/ShowInstrumentView. aspx?InstrumentID=121&InstrumentPID=117&Lang=en&Book= [accessed 22 October 2016]. 50 The Cyberterrorism Project (2013) What is cyberterrorism? UK Legal Definition. Available at http://www.cyberterrorism-project.org/what-is-cyberterrorism [accessed 22 October 2016]. 51 Krasavin S (2009) What is Cyber‑terrorism? Computer Crime Research Center. Available at http://www.crime-research.org/library/Cyber-terrorism.htm [accessed 22 October 2016]. 115


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.